Stipe Kuman, Stjepan Groš, Miljenko Mikuc. An Experiment in using IMUNES and Conpot to Emulate Honeypot Control Networks, Proceedings of MIPRO 2017: 40th International Convention, Opatija, Croatia, Biljanović, Petar (ur.). (accepted for publication)


Vuković, Marin; Kordić, Mario; Jevtić, Dragan. Clustering approach for user location data privacy in telecommunication services // Proceedings MIPRO 2016.




S. Picek, B. Ege, L. Batina, D. Jakobovic, L. Chmielewski, M. Golub. On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box, Proceedings of the First Workshop on Cryptography and Security in Computing Systems, Vienna 20-21. January 2014. pp 13-18.

Stjepan Picek, Lejla Batina, Domagoj Jakobovic, Baris Ege and Marin Golub. Sbox, Set, Match: A Toolbox for S-box Analysis. In D. Naccache and D. Sauveron, editors, Information Security Theory and Practice. Securing the Internet of Things, volume 8501 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2014. pp. 140-149.



S. Groš. Security analysis of Croatia’s receipt registration and verification system, Proceedings of MIPRO 2013: 36th International Convention, Opatija, Croatia, Biljanović, Petar (ur.).

S. Picek, D. Jakobović, M. Golub. Evolving Cryptographically Sound Boolean Functions. Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2013, Jully 6-10, 2013, Amsterdam, Nederland. pp. 191-192.

Rafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic and Marin Golub. Glitch it if you can: Parameter search strategies for successful fault injection. Smart Card Research and Advanced Applications - 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers, pp. 236–252.


S. Groš, M. Stublić, L. Jelenković. Determining Autonomous Systems Reputation based on DNS measurements, Proceedings of MIPRO 2012: 35-th International Convention, Opatija, Croatia, Biljanović, Petar (ur.).


S. Picek, M. Golub. On Evolutionary Computation Methods in Cryptography. Proceedings of the Information Systems Security, MIPRO 2011, May 23 - 27, 2011, Opatija, Croatia. pp. 154-159.







S. Groš, M. Golub, V. Glavinić, Using Trust on the Internet, Proceedings of MIPRO 2008: 31st International Convention, Opatija, Croatia, Biljanović, Petar (ur.).

V. Suhina, S. Groš, Z. Kalafatić, Detecting Vulnerabilities in Web Applications by Clustering Web Pages, Proceedings of MIPRO 2008: 31st International Convention, Opatija, Croatia, Biljanović, Petar (ur.).


S. Groš, V. Glavinić, Architecture of an IKEv2 Protocol Implementation, Proceedings of the Fourth IASTED International Conference on Communication, Network, and Information Security, Dasgupta, Partha (ur.).Berkeley, CA, USA : Acta Press, 2007. 1-6.

A. Kukec, S. Groš, V. Glavinić, Implementation of Certificate Based Authentication in IKEv2 Protocol, Proc. of the ITI 2007. 29th Int'l Conf. on Information Technology Interfaces - ITI 2007, Luzar-Stiffler, Vesna ; Hljuz Dobric, Vesna (ur.). Zagreb : SRCE University Computing Center, University of Zagreb, 2007. 697-702.